The EDRM Enron data set is an industry-standard collection of email data that the
legal profession has used for many years for electronic discovery training and testing.
Since this data set was published, it has been an open secret that it contained many
instances of private, health and financial data.
In this paper, we will discuss a model for setting up an investigative lab that allows digital forensic specialists, non-technical investigators and subject matter experts to collaborate on digital evidence. The end result is a dramatic increase in the volume and quality of digital
evidence an investigative team can analyze within a fixed time.
Bridging the gap between mobile and computer forensicsNina Ananiasvili
Mobile devices are becoming an increasingly integral part of criminal, legal, and regulatory investigations and disclosures.
However, computers and mobile devices are often examined separately by different people, often due to technical and procedural reasons. That can make it almost impossible to identify and review evidence and intelligence across multiple data sources, devices, and crime scenes. Only when we look at all of the devices at the same time will we start to see the complete picture.
In this webinar, we will look at some of the trends and challenges in acquiring and analysis mobile devices and will discuss:
- What we can expect to recover from mobile devices today
- What this data looks like when reviewed using Nuix
- Techniques and workflows for optimising investigations that include mobile devices, computers, and cloud-based evidence.
Electronic records present new challenges for records management that paper records do not. Electronic records are more likely to be unmanaged than paper records, and organizations are less confident that electronic records have not been improperly accessed or changed compared to paper records. Many organizations do not have policies for long-term preservation of electronic records or plans to migrate records to new file formats or storage media. Proper records management is needed to address issues like format and storage media obsolescence to ensure access to electronic records over time.
This document provides an overview of digital forensics and how investigators examine digital evidence. It discusses how data can be hidden and the tools and methods used to detect hidden data, such as Stegdetect software. The document also covers the reliability of digital evidence and the Daubert guidelines for testing evidence validity. Additionally, it provides examples of common email crimes like inheritance and bank scams and the process for investigating email-related offenses.
This document provides an overview of electronic discovery (eDiscovery) including defining electronically stored information (ESI), understanding the eDiscovery process, and Hudson Legal's role. It explains that ESI includes emails, documents, social media posts and more. The eDiscovery process is broken down into the nine phases of the Electronic Discovery Reference Model (EDRM) including identification, preservation, collection, processing, review, analysis, production and presentation. Hudson Legal assists with project management, document review, and quality control during the review process.
Digital forensics is the application of science to solve legal problems involving digital evidence. It has emerged since the 1980s as computer crimes have grown. There are challenges to reliability such as standards, controls, and new technologies like cloud and solid state drives. Case studies demonstrate how digital evidence can solve old cases, as with the BTK killer through metadata on a word document. The field faces ongoing challenges but continued research supports its validity in courts of law.
This document provides an overview of e-discovery and why it should be a priority for organizations. Key points include:
- E-discovery is the process of identifying, preserving, and producing electronic information for legal cases. It is important due to the large volume of electronic data and growing legal obligations.
- Getting the right e-discovery capabilities can help organizations respond more effectively to lawsuits, potentially avoid lawsuits, and reduce costs of email management and litigation.
- The document outlines important e-discovery lessons from past court cases and why data from multiple sources may need to be included in e-discovery processes.
In this paper, we will discuss a model for setting up an investigative lab that allows digital forensic specialists, non-technical investigators and subject matter experts to collaborate on digital evidence. The end result is a dramatic increase in the volume and quality of digital
evidence an investigative team can analyze within a fixed time.
Bridging the gap between mobile and computer forensicsNina Ananiasvili
Mobile devices are becoming an increasingly integral part of criminal, legal, and regulatory investigations and disclosures.
However, computers and mobile devices are often examined separately by different people, often due to technical and procedural reasons. That can make it almost impossible to identify and review evidence and intelligence across multiple data sources, devices, and crime scenes. Only when we look at all of the devices at the same time will we start to see the complete picture.
In this webinar, we will look at some of the trends and challenges in acquiring and analysis mobile devices and will discuss:
- What we can expect to recover from mobile devices today
- What this data looks like when reviewed using Nuix
- Techniques and workflows for optimising investigations that include mobile devices, computers, and cloud-based evidence.
Electronic records present new challenges for records management that paper records do not. Electronic records are more likely to be unmanaged than paper records, and organizations are less confident that electronic records have not been improperly accessed or changed compared to paper records. Many organizations do not have policies for long-term preservation of electronic records or plans to migrate records to new file formats or storage media. Proper records management is needed to address issues like format and storage media obsolescence to ensure access to electronic records over time.
This document provides an overview of digital forensics and how investigators examine digital evidence. It discusses how data can be hidden and the tools and methods used to detect hidden data, such as Stegdetect software. The document also covers the reliability of digital evidence and the Daubert guidelines for testing evidence validity. Additionally, it provides examples of common email crimes like inheritance and bank scams and the process for investigating email-related offenses.
This document provides an overview of electronic discovery (eDiscovery) including defining electronically stored information (ESI), understanding the eDiscovery process, and Hudson Legal's role. It explains that ESI includes emails, documents, social media posts and more. The eDiscovery process is broken down into the nine phases of the Electronic Discovery Reference Model (EDRM) including identification, preservation, collection, processing, review, analysis, production and presentation. Hudson Legal assists with project management, document review, and quality control during the review process.
Digital forensics is the application of science to solve legal problems involving digital evidence. It has emerged since the 1980s as computer crimes have grown. There are challenges to reliability such as standards, controls, and new technologies like cloud and solid state drives. Case studies demonstrate how digital evidence can solve old cases, as with the BTK killer through metadata on a word document. The field faces ongoing challenges but continued research supports its validity in courts of law.
This document provides an overview of e-discovery and why it should be a priority for organizations. Key points include:
- E-discovery is the process of identifying, preserving, and producing electronic information for legal cases. It is important due to the large volume of electronic data and growing legal obligations.
- Getting the right e-discovery capabilities can help organizations respond more effectively to lawsuits, potentially avoid lawsuits, and reduce costs of email management and litigation.
- The document outlines important e-discovery lessons from past court cases and why data from multiple sources may need to be included in e-discovery processes.
This document discusses the prevalence of electronically stored information and the importance of properly preserving it during litigation. It notes that ESI is found in many devices and outlines challenges in data recovery from computers. It emphasizes that deleted files remain recoverable if not overwritten and discusses forensic tools used to recover deleted data. The document provides examples of ESI from different contexts like vehicles, railroads, and outlines legal obligations to preserve relevant ESI when litigation is reasonably anticipated.
The document outlines the steps of a cyber forensic investigation process:
1. Verification and identification of systems involved to collect relevant data.
2. Preservation, collection and acquisition of evidence from systems in a manner that minimizes data loss and maintains a legally defensible chain of custody.
3. Processing, review and analysis of collected data through techniques like timeline analysis, keyword searching and data recovery to find relevant evidence.
Surviving Technology 2009 & The ParalegalAubrey Owens
Talking technology with Paralegal Studies Students at J. Sargent Reynolds Community College on February 25, 2009. Using Software as a Solution for information mangament through trial presentation.
This document discusses e-discovery, which refers to the process of identifying, preserving, collecting, processing, reviewing, analyzing and producing electronically stored information for use as evidence in legal cases. It outlines the Electronic Discovery Reference Model (EDRM) process, which includes identification, preservation, collection, processing, review, analysis and production of electronic data. Terminology used in e-discovery such as ESI, custodian, metadata and legal hold are also defined.
Electronic Document Management And DiscoveryRonald Coleman
Presentation given as part of Delaware Bar Association Computer Law Section CLE program, "E-Commerce law: Critical Legal and Business Issues."
Many of the particulars of this presentation are relatively obsolete now.
Digital forensics involves identifying evidence from digital sources using scientific tools and techniques to solve crimes. There are two criteria for evidence admission in court: relevance to the case and use of scientific methods. Errors in evidence gathering can result in meaningless evidence or penalties. The process involves preservation, identification, extraction, documentation, and interpretation of data. Tools like WetStone's Gargoyle and Niels Provos's stegdetect can detect hidden data. The reliability of found data must undergo a Daubert hearing to ensure the tools and methods are viable in court. Professional, ethical, and legal issues must be considered regarding an investigator's role, privacy concerns, and challenges from evolving technologies.
E Discovery General E Discovery Presentationjvanacour
This document provides an overview of key concepts and best practices regarding electronic discovery (e-discovery). It discusses the duty to preserve relevant evidence once litigation is reasonably anticipated. It also outlines the stages of managing e-discovery, including having a reasonable document retention policy prior to notice, issuing a litigation hold once notice is received, and complying with discovery requests once litigation begins. The document emphasizes communicating preservation obligations, overseeing preservation efforts, and producing electronic documents and metadata in a usable format.
Design for A Network Centric Enterprise Forensic SystemCSCJournals
Increased profitability and exposure of enterprise’s information incite more attackers to attempt exploitation on enterprise network, while striving not to leave any evidences. Although the area of digital forensic analysis is evolving to become more mature in the modern criminology, the scope of network and computer forensics in the large-scale commercial environment is still vague. The conventional forensic techniques, consisting of large proportion of manual operations and isolated processes, are not adequately compatible in modern enterprise context. Data volume of enterprise is usually overwhelming and the interference to business operation during the investigation is unwelcomed. To evidence and monitor these increasing and evolving cyber offences and criminals, forensic investigators are calling for more comprehensive forensic methodology. For comprehension of current insufficiencies, this paper starts from the probes for the weaknesses of various preliminary forensic techniques. Then it proposes an approach to design an enhanced forensic system that integrates the network distributed system concept and information fusion theory as a remedy to the drawbacks of existing forensic techniques.
This document is a research project submitted by Ronak Karanpuria to Prof. S.B.N. Prakash at the National Law School of India University in Bangalore for the subject of E-commerce & IT law in trimester IV of 2013-14. The research project examines the topic of "Electronic Evidence" and addresses its relevance, authenticity, and admissibility in court procedures in the context of the modern digital environment. The document includes sections on the types of electronic evidence, assessing electronic evidence, techno-legal prerequisites for electronic evidence, and the admissibility of electronic evidence. It also briefly discusses cloud computing.
The document discusses the roles and responsibilities of a computer forensic investigator. It explains that an investigator must gather digital evidence in a forensically-sound manner from various computer systems and devices. This includes recovering deleted files, analyzing file slack and unallocated space, validating email messages, and using file hashes and metadata to determine what files were created on which devices. The goal is to properly handle, analyze, and present admissible digital evidence in court.
Computer forensics is the process of identifying, preserving, analyzing and presenting digital evidence in a way that is legally acceptable. It aims to find criminal evidence and present it legally to punish criminals. The main steps are identifying evidence through acquisition and collection, preserving it, analyzing and extracting information from it, documenting the process, and presenting findings. It requires forensic tools like disk imaging software, hashing tools, and password cracking software. It is used for criminal prosecution, civil litigation, detecting financial fraud, and investigating corporate policy violations.
Download DOC word file from below Links:
Link 1 :http://gestyy.com/eiT4WO
Link 2: http://fumacrom.com/RQUm
Disclaimer: Above doc file is only for education purpose only
Process of Digital forensics
Identification
Preservation
Analysis
4. Presentation and Reporting:
5. Disseminating the case:
What is acquisition in digital forensics?
How to handle data acquisition in digital forensics
Types of Digital Forensics
Disk Forensics
Network Forensics
Wireless Forensics
Database Forensics
This document discusses considerations for hiring a digital forensics expert. It defines digital forensics and explains how digital evidence can be found in various devices and used to solve crimes. It outlines the objectives and methodology of digital forensics investigations, including preservation, collection, analysis and presentation of digital evidence. The document warns of risks in self-collecting digital evidence and stresses the importance of using properly trained experts who can ensure evidence is admissible in court.
This document discusses cyber forensics and the digital forensic process. It defines cyber forensics as the scientific examination and analysis of digital evidence for use in a court of law. The process involves securely collecting potential digital evidence, creating forensic images or copies without altering the original, and analyzing the data through examining file systems, recovering deleted files, and determining timelines. Key challenges include a lack of standards and certification for tools and professionals as well as rapid changes in technology. Cyber forensics is considered a fast-growing career field.
Digital forensics is the preservation, identification, extraction and documentation of computer evidence for use in courts. There are various branches including network, firewall, database and mobile device forensics. Digital forensics helps solve cases of theft, fraud, hacking and viruses. Challenges include increased data storage, rapid technology changes and lack of physical evidence. Three case studies showed how digital forensics uncovered evidence through encrypted communications, text messages and diverted drug operations. The future of digital forensics includes more sophisticated tools and techniques to analyze large amounts of data.
Digital Crime & Forensics - Presentationprashant3535
The document discusses digital crime and forensics. It defines digital crime as any crime where a computer is used as a tool or target. Examples include malware, denial of service attacks, and phishing. Forensics involves the identification, preservation, extraction, documentation, interpretation and presentation of digital evidence. However, forensics faces challenges due to issues like anonymity, large data storage, encryption, and differences between legal systems of countries. The document concludes that collaboration between law enforcement, governments and industry is needed to address new trends in digital crime.
The document discusses the authentication of electronic evidence in court. It notes that electronic documents and data come in many forms and present new issues for admissibility. It outlines five hurdles for admitting electronic evidence: relevance, authenticity, hearsay, original writing rule, and unfair prejudice. It focuses on authenticating electronic evidence by establishing its source and demonstrating that it has not been altered. Methods discussed include testimony from witnesses with knowledge, forensic experts, hash values, and maintaining a clear chain of custody for electronic data.
Digital forensics research: The next 10 yearsMehedi Hasan
Today’s Golden Age of computer forensics is quickly coming to an end. Without a clear strategy for enabling research efforts that build upon one another, forensic research will fall behind the market, tools will become increasingly obsolete, and law enforcement, military and other users of computer forensics products will be unable to rely on the results of forensic analysis. This article summarizes current forensic research directions and argues that to move forward the community needs to adopt standardized, modular approaches for data representation and forensic processing.
@2010 Digital Forensic Research Workshop. Published by Elsevier Ltd. All rights reserved
The letter calls for transparency and accountability in the upcoming inquiry into the 2010 Tivoli security forces incursion. It argues that scrutinizing public institutions strengthens rather than weakens them by preserving integrity. The inquiry should seek the truth objectively rather than be adversarial. Any attempts to withhold information under the guise of national security should be viewed as disloyal. The inquiry is an opportunity to restore public confidence by conducting it with integrity.
This document discusses the prevalence of electronically stored information and the importance of properly preserving it during litigation. It notes that ESI is found in many devices and outlines challenges in data recovery from computers. It emphasizes that deleted files remain recoverable if not overwritten and discusses forensic tools used to recover deleted data. The document provides examples of ESI from different contexts like vehicles, railroads, and outlines legal obligations to preserve relevant ESI when litigation is reasonably anticipated.
The document outlines the steps of a cyber forensic investigation process:
1. Verification and identification of systems involved to collect relevant data.
2. Preservation, collection and acquisition of evidence from systems in a manner that minimizes data loss and maintains a legally defensible chain of custody.
3. Processing, review and analysis of collected data through techniques like timeline analysis, keyword searching and data recovery to find relevant evidence.
Surviving Technology 2009 & The ParalegalAubrey Owens
Talking technology with Paralegal Studies Students at J. Sargent Reynolds Community College on February 25, 2009. Using Software as a Solution for information mangament through trial presentation.
This document discusses e-discovery, which refers to the process of identifying, preserving, collecting, processing, reviewing, analyzing and producing electronically stored information for use as evidence in legal cases. It outlines the Electronic Discovery Reference Model (EDRM) process, which includes identification, preservation, collection, processing, review, analysis and production of electronic data. Terminology used in e-discovery such as ESI, custodian, metadata and legal hold are also defined.
Electronic Document Management And DiscoveryRonald Coleman
Presentation given as part of Delaware Bar Association Computer Law Section CLE program, "E-Commerce law: Critical Legal and Business Issues."
Many of the particulars of this presentation are relatively obsolete now.
Digital forensics involves identifying evidence from digital sources using scientific tools and techniques to solve crimes. There are two criteria for evidence admission in court: relevance to the case and use of scientific methods. Errors in evidence gathering can result in meaningless evidence or penalties. The process involves preservation, identification, extraction, documentation, and interpretation of data. Tools like WetStone's Gargoyle and Niels Provos's stegdetect can detect hidden data. The reliability of found data must undergo a Daubert hearing to ensure the tools and methods are viable in court. Professional, ethical, and legal issues must be considered regarding an investigator's role, privacy concerns, and challenges from evolving technologies.
E Discovery General E Discovery Presentationjvanacour
This document provides an overview of key concepts and best practices regarding electronic discovery (e-discovery). It discusses the duty to preserve relevant evidence once litigation is reasonably anticipated. It also outlines the stages of managing e-discovery, including having a reasonable document retention policy prior to notice, issuing a litigation hold once notice is received, and complying with discovery requests once litigation begins. The document emphasizes communicating preservation obligations, overseeing preservation efforts, and producing electronic documents and metadata in a usable format.
Design for A Network Centric Enterprise Forensic SystemCSCJournals
Increased profitability and exposure of enterprise’s information incite more attackers to attempt exploitation on enterprise network, while striving not to leave any evidences. Although the area of digital forensic analysis is evolving to become more mature in the modern criminology, the scope of network and computer forensics in the large-scale commercial environment is still vague. The conventional forensic techniques, consisting of large proportion of manual operations and isolated processes, are not adequately compatible in modern enterprise context. Data volume of enterprise is usually overwhelming and the interference to business operation during the investigation is unwelcomed. To evidence and monitor these increasing and evolving cyber offences and criminals, forensic investigators are calling for more comprehensive forensic methodology. For comprehension of current insufficiencies, this paper starts from the probes for the weaknesses of various preliminary forensic techniques. Then it proposes an approach to design an enhanced forensic system that integrates the network distributed system concept and information fusion theory as a remedy to the drawbacks of existing forensic techniques.
This document is a research project submitted by Ronak Karanpuria to Prof. S.B.N. Prakash at the National Law School of India University in Bangalore for the subject of E-commerce & IT law in trimester IV of 2013-14. The research project examines the topic of "Electronic Evidence" and addresses its relevance, authenticity, and admissibility in court procedures in the context of the modern digital environment. The document includes sections on the types of electronic evidence, assessing electronic evidence, techno-legal prerequisites for electronic evidence, and the admissibility of electronic evidence. It also briefly discusses cloud computing.
The document discusses the roles and responsibilities of a computer forensic investigator. It explains that an investigator must gather digital evidence in a forensically-sound manner from various computer systems and devices. This includes recovering deleted files, analyzing file slack and unallocated space, validating email messages, and using file hashes and metadata to determine what files were created on which devices. The goal is to properly handle, analyze, and present admissible digital evidence in court.
Computer forensics is the process of identifying, preserving, analyzing and presenting digital evidence in a way that is legally acceptable. It aims to find criminal evidence and present it legally to punish criminals. The main steps are identifying evidence through acquisition and collection, preserving it, analyzing and extracting information from it, documenting the process, and presenting findings. It requires forensic tools like disk imaging software, hashing tools, and password cracking software. It is used for criminal prosecution, civil litigation, detecting financial fraud, and investigating corporate policy violations.
Download DOC word file from below Links:
Link 1 :http://gestyy.com/eiT4WO
Link 2: http://fumacrom.com/RQUm
Disclaimer: Above doc file is only for education purpose only
Process of Digital forensics
Identification
Preservation
Analysis
4. Presentation and Reporting:
5. Disseminating the case:
What is acquisition in digital forensics?
How to handle data acquisition in digital forensics
Types of Digital Forensics
Disk Forensics
Network Forensics
Wireless Forensics
Database Forensics
This document discusses considerations for hiring a digital forensics expert. It defines digital forensics and explains how digital evidence can be found in various devices and used to solve crimes. It outlines the objectives and methodology of digital forensics investigations, including preservation, collection, analysis and presentation of digital evidence. The document warns of risks in self-collecting digital evidence and stresses the importance of using properly trained experts who can ensure evidence is admissible in court.
This document discusses cyber forensics and the digital forensic process. It defines cyber forensics as the scientific examination and analysis of digital evidence for use in a court of law. The process involves securely collecting potential digital evidence, creating forensic images or copies without altering the original, and analyzing the data through examining file systems, recovering deleted files, and determining timelines. Key challenges include a lack of standards and certification for tools and professionals as well as rapid changes in technology. Cyber forensics is considered a fast-growing career field.
Digital forensics is the preservation, identification, extraction and documentation of computer evidence for use in courts. There are various branches including network, firewall, database and mobile device forensics. Digital forensics helps solve cases of theft, fraud, hacking and viruses. Challenges include increased data storage, rapid technology changes and lack of physical evidence. Three case studies showed how digital forensics uncovered evidence through encrypted communications, text messages and diverted drug operations. The future of digital forensics includes more sophisticated tools and techniques to analyze large amounts of data.
Digital Crime & Forensics - Presentationprashant3535
The document discusses digital crime and forensics. It defines digital crime as any crime where a computer is used as a tool or target. Examples include malware, denial of service attacks, and phishing. Forensics involves the identification, preservation, extraction, documentation, interpretation and presentation of digital evidence. However, forensics faces challenges due to issues like anonymity, large data storage, encryption, and differences between legal systems of countries. The document concludes that collaboration between law enforcement, governments and industry is needed to address new trends in digital crime.
The document discusses the authentication of electronic evidence in court. It notes that electronic documents and data come in many forms and present new issues for admissibility. It outlines five hurdles for admitting electronic evidence: relevance, authenticity, hearsay, original writing rule, and unfair prejudice. It focuses on authenticating electronic evidence by establishing its source and demonstrating that it has not been altered. Methods discussed include testimony from witnesses with knowledge, forensic experts, hash values, and maintaining a clear chain of custody for electronic data.
Digital forensics research: The next 10 yearsMehedi Hasan
Today’s Golden Age of computer forensics is quickly coming to an end. Without a clear strategy for enabling research efforts that build upon one another, forensic research will fall behind the market, tools will become increasingly obsolete, and law enforcement, military and other users of computer forensics products will be unable to rely on the results of forensic analysis. This article summarizes current forensic research directions and argues that to move forward the community needs to adopt standardized, modular approaches for data representation and forensic processing.
@2010 Digital Forensic Research Workshop. Published by Elsevier Ltd. All rights reserved
The letter calls for transparency and accountability in the upcoming inquiry into the 2010 Tivoli security forces incursion. It argues that scrutinizing public institutions strengthens rather than weakens them by preserving integrity. The inquiry should seek the truth objectively rather than be adversarial. Any attempts to withhold information under the guise of national security should be viewed as disloyal. The inquiry is an opportunity to restore public confidence by conducting it with integrity.
Sarfaraz Shaikh is a web and graphics specialist based in Saudi Arabia seeking a new career opportunity. He has over 15 years of experience in graphic design, web design, multimedia, and digital marketing. He is proficient in programs like Adobe CC, MS Office, and has experience designing websites, graphics, presentations, and marketing materials for companies. Currently he works as a senior web and graphic specialist for a Hyundai dealership in Saudi Arabia, where he leads design projects and manages digital marketing strategies.
Slides fra Dansk Universitetspædagogisk Netværk Konference 2016 om "Værdi-baseret visions-drevet didaktisk design tænkning i undervisningen på universitetet"
The document discusses bioluminescent plankton found near Vaadhoo Island in the Maldives and includes coordinates for the location. It also mentions the 2014 Jeep Grand Cherokee and notes that Jeep is a registered trademark of Chrysler Group LLC.
El documento define el arte contemporáneo como el arte creado después de la Segunda Guerra Mundial y discute varios movimientos importantes dentro de este periodo como el fauvismo, cubismo, expresionismo, dadaísmo y surrealismo. Estos movimientos se caracterizaron por cuestionar los principios artísticos tradicionales y explorar nuevas técnicas como el uso de colores vibrantes, ángulos múltiples y elementos no convencionales. El arte contemporáneo continúa evolucionando y representando los cambios filosóficos,
Slides from Assistant Professor Rikke Toft Nørgård and PhD Fellow Janus Holst Aaen's invited talk at the Center for Higher Education Studies, Institute of Education, UCL on November 8th 2015 where Rikke Toft Nørgård have been a visiting academic in the Fall 2015: https://www.ioe.ac.uk/research/189.html
Atahualpa fue el decimotercer emperador inca que gobernó parte del imperio incaico. Tras la muerte de su padre Huayna Cápac, entró en una guerra civil con su hermano Huáscar por el control del imperio. Finalmente, los españoles liderados por Francisco Pizarro capturaron y ejecutaron a Atahualpa a pesar de que este les ofreció un rescate de oro a cambio de su libertad. Su muerte marcó el fin del imperio incaico y dejó un legado como el último gobernante
119 Book Marketing Ideas That Can Help Authors Increase SalesBookBub
There’s a wide array of tactics you can use to amplify a book's exposure & reach more readers. Check out these 119 book marketing ideas for inspiration! See the full post here: http://insights.bookbub.com/book-marketing-ideas
El documento explica las definiciones y usos de Bitcoin. Se define a Bitcoin como una moneda electrónica libre y descentralizada basada en redes P2P. Para usar Bitcoin se necesita un monedero virtual para almacenarlos y realizar pagos y cobros mediante transferencias entre monederos usando códigos de direcciones. Las ventajas de Bitcoin incluyen pagos internacionales instantáneos, tasas bajas y seguridad al no requerir datos personales.
A Survey of Security and Forensic Features In Popular eDiscovery Software SuitesCSCJournals
Litigation these days involves Electronically Stored Information (ESI) for legal purposes. Electronic discovery, also known as eDiscovery, is a process involving legal parties on a case to preserve, collect, review, and exchange electronic information for the purpose of using it as evidence in the case. In the past two decades, the software industry has launched many products catering to eDiscovery. With the advent of cloud computing, storage of electronic data has become cheaper and attractive for eDiscovery needs. With the ever growing technological advances, access to such storage has become simplified for enterprises distributed across the globe. eDiscovery product vendors have embraced the cloud and often allow their products to store and retrieve electronic evidence from the cloud. In this paper, we survey and explore eDiscovery product features focusing on available product security features, security features for evidence protection, incident forensics readiness and cloud forensics. We strive to highlight the challenges in the eDiscovery field when handling vast volumes of electronic evidence and propose incorporating industry best practices in implementing effective security and incident forensics at the product level.
Several companies may be well on the way to define how to handle GDPR compliance for structured data. But many companies still haven't come up with a good way to handle GDPR compliance for unstructured data..
This whitepaper provides the main information about unstructured data and the Xenit solution to manage documents under the regulation.
Solutions for privacy, disclosure and encryptionTrend Micro
Trend Micro provides data protection solutions to help organizations meet privacy, disclosure, and encryption compliance requirements. Their solutions include data loss prevention software to monitor and protect confidential data across systems, and email encryption to securely transmit sensitive information. The document discusses challenges around accuracy, usability, and cost-effectiveness that these solutions aim to address through policy-based monitoring, automatic detection and protection of data, and integration with existing infrastructure.
This document discusses the importance of information security for government organizations. It notes that rapid advances in information technology have created significant risks to government operations as they increasingly rely on digital systems and data. The primary goals of enterprise security programs are to protect systems and data at appropriate levels of integrity, availability, and confidentiality without hindering productivity or innovation. However, many losses still occur due to errors by authorized users, disgruntled employees, or external hackers exploiting vulnerabilities in traditional security controls.
This document discusses security concepts related to databases and data. It defines several types of security that organizations implement to protect operations, including physical security, personnel security, operations security, communications security, network security, and information security. It also discusses personal data protection laws, data security definitions and concepts, types of database backups that can be performed, security at the server, network and operating system levels, data encryption, and the importance of database auditing and monitoring for security and accountability.
iStart feature: Protect and serve how safe is your personal data?Hayden McCall
The revelations of the Heartbleed vulnerability in April and the recent implementation of Australia’s new privacy regime in March have put data breaches firmly back in the limelight. Clare Coulson finds out more...
- Ensure you have proper notice, consent, and access policies in place when collecting or using personal data
- Only collect and use data for the specific purposes it was provided and for which consent was given
- Handle all data securely and ensure it is stored and transmitted safely, especially if transferring across borders
- Be aware of relevant privacy laws in all locations where data is collected or used to ensure compliance
- Consider how the data could help improve processes, products, or services but respect the individual's privacy
Multilevel Privacy Preserving by Linear and Non Linear Data DistortionIOSR Journals
This document discusses privacy-preserving techniques for data mining called multilevel privacy preserving. It introduces the concept of generating multiple perturbed copies of data at different trust levels to protect privacy while allowing useful data mining. Key techniques discussed include data perturbation through adding random noise or distorting values, as well as data modification through aggregation, suppression, and swapping. Maintaining privacy is achieved by ensuring the noise added to different copies has a "corner-wave" covariance structure so statistical values do not differ significantly from the original data.
1) Caroline Rivett discusses how cloud technology can support digital health services but also risks to sensitive medical information stored in the cloud.
2) Medical information is rapidly expanding due to devices that transmit health data, personal health apps, genetic sequencing projects, and growth of electronic health records.
3) Key considerations for using cloud technology include ensuring security of medical data from hackers or nation states, as well as complying with privacy laws and regulations regarding sensitive personal health information.
Addressing the EU GDPR & New York Cybersecurity Requirements: 3 Keys to SuccessSirius
The EU Global Data Protection Regulation (GDPR) and New York State Cybersecurity Requirements for Financial Services Companies (23 NYCRR 500) represent a landmark change in the global data protection space. While they originate in different countries and apply to different organizations, their primary message is the same:
Protect your data, or pay a steep price. More specifically, protect the sensitive data you collect from customers.
With deadlines looming, is your organization ready?
The time to act is now. Read more to learn:
--Key mandates and minimum requirements for compliance
--Why a comprehensive data-centric security strategy is invaluable to all data protection and data privacy efforts
--How you can gauge your organization’s incident response capabilities
--How to extend your focus beyond the organization’s figurative four walls to ensure requirements are met throughout your supply chain
The first New York requirements deadline has arrived. With the next deadline of mandates only 6 months away, you don't want to fall behind and leave your organization at risk for potential penalties and fines.
This document discusses electronic discovery (eDiscovery) which refers to the discovery of electronically stored information in legal cases. It notes that eDiscovery costs are skyrocketing, averaging over $1.5 million per corporate lawsuit. The document outlines typical eDiscovery costs including collecting, processing, reviewing data which can cost thousands or millions depending on the size of the case. It emphasizes that proactive information management is key to addressing eDiscovery by developing policies to help employees manage information and only retain necessary records.
Electronic discovery, or eDiscovery, refers to the discovery of electronically stored information in legal proceedings. This includes information stored on devices like computers, phones, hard drives, and more. eDiscovery is more complex than paper discovery due to factors like the persistence, dynamic nature, metadata, and dispersion of electronic data. Managing eDiscovery effectively requires proactive information management policies to control electronic records and reduce costs when responding to legal requests.
Regulatory Control functions, such as Operational Risk, Compliance and Audit, increasingly raise questions around the scope, management, and identification of sensitive data within distributed and mainframe application environments.
This project is due by the end of the residency weekend. Purpose.docxrowthechang
This project is due by the end of the residency weekend.
Purpose
The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute. The following aspects of litigation and document retention are covered:
Applicability of confidentiality, integrity, and availability (C-I-A) concepts
Confidentiality of personal information and contracts
Applicability of the American legal system in the litigation process involving corporate, public, and private institutions
Intellectual property (IP) issues
Risk analysis and incident response procedures
Forensics examination
Required Source Information and Tools
The following tools and resources will be needed to complete this project:
Course textbook
Access to the Internet
Project Litigation Hold Notice handout (legal_ts_projectlitigationholdnotice)
Project Appendix A handout (legal_ts_projectappendixa)
Learning Objectives and Outcomes
You will gain an understanding of the aspects involved in the conception, enforcement, and implementation of security policies. You will also gain insight to risk analysis and will learn how to respond to any given situation that might arise from a violation of those security policies.
Deliverables
Scenario
You are member of the IT Staff for Premier College. Recently, your college has received a notice from the Department of Education about an investigation of your college based on the state-specific testing and compliance procedures. The Department of Education has sent a Litigation Hold Notice wherein they have asked all college staff and administrators of the college to preserve all relevant documents, records, data, contracts (regardless of its location or medium), and correspondence notes.
To understand the litigation hold notice received from the Department of Education, refer to the documents entitled “Project Litigation Hold Notice“ (legal_ts_projectlitigationholdnotice) and “Project Appendix A” (legal_ts_projectappendixa). As a reminder, this Litigation Hold preservation obligation supersedes any existing statutory or regulatory document retention period or destructive schedule. The determination of what information may be potentially relevant is based upon content and substance and generally does not depend on the type of medium in which the information exists.
The information requested may exist in various forms, including paper records, handwritten notes, telephone log entries, e-mail, and other electronic communications (including voicemail), word processing documents (including drafts, spreadsheets, databases, and calendars), telephone logs, electronic address books, smartphones, Internet usage files, systems manuals, and network access information in their original format.
All electronically stored information (ESI) should be preserved in its originally created, or “native” format, along with related metadata. Rel ...
Law firm information security overview focus on encryption by dave cunningh...David Cunningham
The document summarizes key information security regulations relevant to law firms, with a focus on encryption requirements. It discusses regulations including HIPAA, ITAR, Massachusetts Data Privacy Law, Safe Harbor Framework, Red Flags Rule, and ISO 27001. The Massachusetts law requires law firms to encrypt transmitted records containing personal information, data stored on laptops and portable devices if technically feasible, and use access controls.
“Who’s Afraid of E-Discovery” was presented by George E. Pallas and Jason Copley from the Law Firm of Cohen Seglias Pallas Greenhall & Fuman PC for the members of the Mid-Atlantic Steel Fabricators Association.
The document discusses key issues for implementing personal data protection procedures in accordance with relevant laws. It covers: 1) defining personal data and classifications; 2) analyzing internal and outsourced data processing; 3) identifying department responsibilities; 4) classifying files by data type; 5) creating an internal company policy; 6) processing data by third parties; 7) transferring data between companies; 8) required security and registration documents. The payment section lists additional procedure, IT, security, and audit documents to ensure compliance.
This document discusses the benefits of archiving electronic content like email for medical establishments. It notes that archiving is necessary to comply with regulations like HIPAA that require preserving patient records for long periods of time. Archiving supports legal requirements to retain content that may be needed for litigation and allows placing holds on content when requested. It also helps manage storage and reduces costs. Overall archiving is important for regulatory compliance, legal needs, and cost savings.
Similar to Case study nuix edrm enron data set (20)
UiPath Test Automation using UiPath Test Suite series, part 5DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 5. In this session, we will cover CI/CD with devops.
Topics covered:
CI/CD with in UiPath
End-to-end overview of CI/CD pipeline with Azure devops
Speaker:
Lyndsey Byblow, Test Suite Sales Engineer @ UiPath, Inc.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Case study nuix edrm enron data set
1. REMOVING PII FROM THE EDRM ENRON DATA SET
Investigating the prevalence of unsecured financial, health and
personally identifiable information in corporate data
CASE STUDY NUIX AND EDRM
The EDRM Enron data set is an industry-standard collection of email data that the
legal profession has used for many years for electronic discovery training and testing.
Since this data set was published, it has been an open secret that it contained many
instances of private, health and financial data. Nuix volunteered to investigate the
EDRM Enron data set and remove as much of this personal information as possible
before republishing a cleansed version of the data. The results of our investigation
present food for thought about the prevalence of private data in all corporate data
sets and the serious business risks it represents.
Under a thick blanket of privacy legislation in
almost all Western countries, organizations
must take extreme care to protect any
personally identifiable information (PII) and
personal health information (PHI) they store
relating to employees or customers.
For example, the European Commission’s
proposed General Data Protection Regulation
will impose fines of up to 2% of a company’s
annual global turnover for failure to protect
consumers’ private information.1
This regulation,
set to be adopted in 2014, will apply to
businesses that operate in the EU or that hold
personal information of EU citizens.
Similarly, the United States Department of
Commerce’s guide to protecting PII for federal
government agencies details a long list of
“operational safeguards, privacy-specific
safeguards and security controls.”2
Organizations that accept credit card payments
must also comply with the Payment Card
Industry Security Standards (commonly
referred to as “PCI”) imposed by the credit
card companies. Under these guidelines,
organizations may only store limited types
of data about credit card holders and must
use encryption to render this information
“unreadable” wherever the organization keeps
it.3
Failure to comply with PCI standards can
result in that organization losing its ability to
process credit card payments.
While these laws are well known, very
few organizations thoroughly comply with
these regulations. Employees often make
“convenience copies” and store such
information without encryption in file shares
and collaboration systems or send it outside
the organization in emails.
2. NUIX AND EDRM CASE STUDY: REMOVING PII FROM THE EDRM ENRON DATA SET
PAGE 2
ORGANIZATIONS CANNOT IGNORE
THE RISKS
Although inappropriately stored private, health or
financial data are a serious business risk, many
organizations do not take steps to address these
issues based on two assumptions:
• “We don’t have to worry unless our systems
are hacked.” Although we improperly store this
information, it can’t find its way outside the
firewall unless there is a security breach.
• “The information is there, but no one can find it.”
We have masses of unstructured data and it
would be virtually impossible, or too resource
intensive, to trawl through millions of emails and
files for privacy breaches. It would be equally hard
for anyone else to find the private information
stored in our systems.
Both assumptions are false.
Employees regularly take this information outside the
firewall using flash memory devices, personal laptops
and smartphones and cloud storage services. They
also send this information to private email addresses
for business-related and less legitimate purposes.
In addition, technology advances have made it
much easier to index large volumes of unstructured
data and locate improperly stored privacy, health or
financial information within it.
THE SOURCE DATA AT A GLANCE
For the purposes of this exercise, Nuix
used the EDRM Enron PST Data Set,
which comprises:
• 1.3 million email messages and
attachments from former Enron staff
• 168 Microsoft Outlook .PST files
• Almost 40 GB of data.
THE DATA SET
Nuix volunteered to examine the prevalence of PII, PHI and PCI within
the Enron PST Data Set published by EDRM and ZL Technologies, Inc.
This is a worldwide standard set of test data for electronic discovery
practitioners and vendors.
The EDRM Data Set Project “provides industry-standard, reference
data sets of electronically stored information (ESI) and software
files that can be used to test various aspects of e-discovery software
and services.”
This data set is sourced from the Federal Energy Regulatory
Commission’s investigation into collapsed energy firm Enron. The
EDRM Enron PST Data Set contains approximately 1.3 million email
messages which ZL Technologies distilled into 168 Microsoft Outlook
.PST files. These email messages were sent and received by Enron
staff in the course of day-to-day business.
THE METHODOLOGY
Nuix’s Implementation Engineer Matthew Westwood-Hill and
EMEA Director of Solution Consultancy Ady Cassidy analyzed the
EDRM Enron PST Data Set with a series of standard investigative
workflows. Nuix and EDRM are pleased to offer the legal and
investigator community this methodology for identifying personal
and financial data in corporate data sets.
• Fully indexing the text and metadata. This was straightforward
because the Enron data had already been converted into
industry-standard PST files. In real-world situations, email might
also be stored in Microsoft Exchange Server databases, archives,
legacy email platforms or cloud services. Organizations might
also need to examine network file shares, collaboration systems
and individual computers.
• Using Nuix’s “named entities” function to identify dates of
birth and credit card and national identity numbers in the data
set. Nuix uses regular expression pattern matching to extract
intelligence from data sets during processing. Investigators can
then cross-reference these intelligence items across multiple
data sources.
• Searching for email messages sent to external domains of law
firms known to handle personal legal matters. Nuix can group
email messages by the domain name they are sent to, making
these external messages easy to find.
• Searching for phrases and close groupings of keywords that
could indicate personal legal or health discussions, online
purchases or other private matters.
• Creating network maps and timelines of email correspondence
to identify communication patterns and understand messages
and documents in the context of external events.
Technology advances have made it much easier to index large volumes of unstructured data
and locate improperly stored privacy, health or financial information within it.
3. NUIX AND EDRM CASE STUDY: REMOVING PII FROM THE EDRM ENRON DATA SET
PAGE 3
THE RESULTS
Nuix’s investigation identified more than 10,000 emails and
attachments containing personal data (see table below).
This included:
• 60 items containing credit card numbers, including
departmental contact lists that each contained
hundreds of individual credit cards
• 572 containing Social Security or other national
identity numbers–thousands of individuals’ identity
numbers in total
• 292 containing individuals’ dates of birth
• 532 containing information of a highly personal nature
such as medical or legal matters.
In many cases, a single item would contain multiple
instances and multiple types of information. For example,
the data set included many departmental contact lists
in spreadsheet form that included dates of birth, Social
Security numbers, home addresses and other details
of dozens of staff members. In some cases, these
spreadsheets also contain the names of employees’
spouses and children.
In addition, our investigations clearly showed a
considerable number of these items were sent outside the
company. For example, employees would forward details
to their personal email addresses, presumably to work
from home or while traveling.
TYPE OF INFORMATION NUMBER OF ITEMS CONTAINING
THIS TYPE OF INFORMATION
Credit card number 60
Date of birth 292
Highly personal information 532
National identity numbers 572
Personal contact details 6,237
Résumés containing substantial personal contact details 3,023
THE METHODOLOGY CONTINUED
Having identified large numbers of suspect emails and attachments
using this method, the investigators conducted further analyses on
these items, including:
• Using “near duplicate” and “similar documents” functionality
to find similar and related content and put together
conversation threads. Nuix analyzes four- or five-word phrases,
called “shingles,” and compares the number of identical
shingles between documents to determine the degree of
similarity. A list of shingles can also provide a convenient way
to narrow down searches, especially where keywords have
multiple meanings or are commonly used. For example, a list
of phrases containing the word “divorce” would provide a
much more targeted search than a simple or proximity search
containing that word.
• Using network maps to show which messages and attachments
had been sent outside the company, for example to personal
email addresses.
Both Nuix investigators completed their research within two days.
Because the Enron data had already been distilled into PST files,
rather than including the original source material, it was not
possible to forensically analyze the data set. With real-world
data, it is possible to conduct deeper analysis of the complete
metadata and forensic artifacts within storage, system files and
email databases. For example, this could provide evidence that
employees had copied sensitive files to flash drives or sent them
outside the firewall.
MORE THAN 10,000 ITEMS OF PERSONALLY IDENTIFIABLE INFORMATION
Nuix’s investigation of the EDRM Enron PST Data Set identified the following personally identifiable information:
Nuix’s investigation identified more than 10,000 emails and attachments
containing personal data.
The cleansed data is published at www.nuix.com/enron
4. NUIX AND EDRM CASE STUDY: REMOVING PII FROM THE EDRM ENRON DATA SET
PAGE 4
IS THE SITUATION BETTER OR WORSE TODAY?
The EDRM Enron data set is more than a decade old and
organizations are much more aware today than they were
in the early 2000s about the need to protect private data. In
addition, since its collapse Enron has become a byword for
corporate governance failings. Is it possible the Enron data set is
exceptionally bad? Or do most organizations have hidden privacy
data risks hidden in their information stores?
Nuix and its solution partners have conducted sweeps for private
and credit card data in unstructured information stores for dozens
of corporate customers. We are yet to encounter a data set that
did not include some inappropriately stored personal, financial or
health information.
For example, in one large insurance company, Nuix identified
dozens of Microsoft Excel spreadsheets containing credit card
numbers, expiry dates, CVV numbers, home addresses and dates
of birth for entire departments of staff members—hundreds
of employees in some cases. These convenience copies were
accessible to anyone who had password access to the shared
drive, making them a significant business risk.
In our experience, email and file shares also frequently contain
other business risks such as inappropriate images and royalty-
bearing content such as audio and video files.
In the past decade, the opportunities for private information to be
stored inappropriately have multiplied. This information can be
stored and taken outside the firewall using:
• Cloud email services such as Gmail and Hotmail
• Cloud storage services such as Dropbox, Box and iCloud
• Personal laptops, tablets and smartphones, often used under
“bring your own device” policies
• Very high capacity USB keys and other flash memory devices.
In addition, organizations expend a great deal of effort to protect
data, making multiple copies and backups, often across several
data centers. This multiplies the number of places private, health
and financial information is stored, once it is in the system.
TAKE STEPS TO ADDRESS A SUBSTANTIAL
BUSINESS RISK
It is hard to avoid the conclusion that most
organizations have PII, PHI and PCI data stored
inappropriately, and that this information does not stay
within the firewall. The increasing burden of privacy
and data breach regulations, combined with the strict
requirements of credit card companies, make this an
unacceptable risk.
Using the tools and methodology outlined in this paper,
organizations can identify inappropriately stored PII
and PCI data and take immediate steps to mitigate the
risks involved.
1
European Commission, “Proposal for a regulation of the European Parliament and of the Council on the protection of individuals with
regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation),” 2012,
http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf.
2
E. McCallister, T. Grance and K. Scarfone, “Guide to Protecting the Confidentiality of Personally Identifiable Information (PII):
Recommendations of the National Institute of Standards and Technology,” National Institute of Standards and Technology, 2010,
http://csrc.nist.gov/publications/nistpubs/800-122/sp800-122.pdf.
3
See for example PCI Security Standards Council, “PCI DSS Quick Reference Guide: Understanding the Payment Card Industry Data Security
Standard version 2.0,” 2010, https://www.pcisecuritystandards.org/documents/PCI%20SSC%20Quick%20Reference%20Guide.pdf.
4
L. Sweeney, “Computational Disclosure Control: A Primer on Data Privacy Protection,” Massachusetts Institute of Technology. Dept. of
Electrical Engineering and Computer Science, 2001, http://hdl.handle.net/1721.1/8589.
WHAT IS PERSONALLY
IDENTIFIABLE INFORMATION (PII)?
Personally identifiable information
includes any combination of data
that could be combined to identify an
individual. This may not include the
person’s name or address—for example,
one researcher found the combination
of gender, zip code and date of birth was
enough to uniquely identify 87% of the
population of the United States.4
We are yet to encounter a data set that did not include some inappropriately
stored personal, financial or health information.
5. NUIX AND EDRM CASE STUDY: REMOVING PII FROM THE EDRM ENRON DATA SET
For more information, visit www.nuix.com/enronwww.nuix.com
NUIX INVESTIGATOR
Nuix Investigator software enables corporate law enforcement and regulatory
investigators to search and correlate across vast amounts of data quickly and
efficiently. With Nuix, investigators can gather all available data in a single location
and use advanced investigative techniques to understand the content and context
of digital evidence. Nuix offers a range of products for different case sizes, with
unmatched capabilities to handle the largest data sets and the finest forensic details.
Matthew Westwood-Hill joined Nuix in 2013 as an Implementation Engineer advising clients
on best-practice ways to use our software and developing solutions that meets their needs. Matthew
is an expert in computer forensics, computer investigations and enterprise-wide electronic discovery
with more than 15 years experience in the IT industry.
Prior to joining Nuix, Matthew worked for one of the top law firms in Australia. He also ran a
computer forensic and electronic discovery company that delivered a full spectrum of digital forensic
investigation services including warrants, recovering and analyzing a wide range of electronic
devices, reporting on these findings and acting as an expert witness in court. He also has extensive
experience recovering deleted and encrypted data.
Ady Cassidy joined Nuix in 2011, as Director of Solution Consultancy based in London, UK.
Ady is a computer forensic investigator and eDiscovery consultant who has worked for more
than 20 years as a computer forensic analyst with the Suffolk Police High Tech Crime Unit. Before
joining Nuix, Ady was Managing Consultant with 7Safe, where he was responsible for managing
the London based eDiscovery team deploying end-to-end forensic and eDiscovery services.
Ady has had a number of white papers published covering aspects of metadata within the EDRM
and eDiscovery practices. Ady has managed large onsite eDiscovery data collections for global
partners and has undertaken work at the highest security levels.
ABOUT NUIX
Nuix enables people to make fact-based decisions from
unstructured data. The patented Nuix Engine makes small
work of large and complex human-generated data sets.
Organizations around the world turn to Nuix software when
they need fast, accurate answers for digital investigation,
cybersecurity, eDiscovery, information governance, email
migration, privacy and more.
ABOUT EDRM
EDRM (www.edrm.net) creates practical resources to improve eDiscovery and
Information Governance. Launched in May 2005, EDRM was created to address the lack
of standards and guidelines in the eDiscovery market. EDRM published the Electronic
Discovery Reference Model in January 2006, followed by additional resources such as
IGRM, CARRM and the Talent Task Matrix. Since its launch, EDRM has comprised more
than 260 organizations, including 170 service and software providers, 63 law firms, three
industry groups and 23 corporations involved with eDiscovery.